chunk_id
string
chunk
string
26b405692546ec7b1444f54cb4e27c65_4
The document Troubleshooting stale connection problems [http://www-01.ibm.com/support/docview.wss?uid=swg21247168#SCETroubleshooting] provides further information. RELATED INFORMATION #RES unable to load ruleset after period of inactivity [http://www-01.ibm.com/support/docview.wss?uid=swg21615801] Troubleshooting stale connection problems [http://www-01.ibm.com/support/docview.wss?uid=swg21247168#SCETroubleshooting] Cross reference information Segment Product Component Platform Version Edition Business Integration IBM Operational Decision Manager Platform Independent 8.5, 8.0.1, 8.0, 7.5 Enterprise
1480055b24e512932102ab9951e73f8a_0
IBM Security Bulletin: Malformed client flows abend MQTT channel (CVE-2015-4943, CVE-2015-4941, CVE-2015-4942) - United States SECURITY BULLETIN SUMMARY A number of malformed MQTT client flows could be issued by a malicious user to cause the MQXR service to abend and require manual restart.
1480055b24e512932102ab9951e73f8a_1
VULNERABILITY DETAILS CVEID: CVE-2015-4943 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4943] DESCRIPTION: IBM WebSphere MQ could allow a remote attacker to crash the MQXR service using a sequence of connect and disconnects which will have to be restarted. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/104516 [https://exchange.xforce.ibmcloud.com/vulnerabilities/104516] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2015-4941 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4941] DESCRIPTION: IBM WebSphere MQ could allow a remote attacker to crash the MQXR service due to incorrect handling of abbreviated TLS handshake. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/104514 [https://exchange.xforce.ibmcloud.com/vulnerabilities/104514] for the current score CVSS Environmental Score*: Undefined
1480055b24e512932102ab9951e73f8a_2
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
1480055b24e512932102ab9951e73f8a_3
CVEID: CVE-2015-4942 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4942] DESCRIPTION: IBM WebSphere MQ could allow a remote attacker to crash the MQXR service using a sequence of connect and disconnects which will have to be restarted. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/104515 [https://exchange.xforce.ibmcloud.com/vulnerabilities/104515] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) AFFECTED PRODUCTS AND VERSIONS IBM WebSphere MQ 8.0 - IBM WebSphere MQ 8.0.0.3 and earlier maintenance levels IBM WebSphere MQ 7.5 - IBM WebSphere MQ 7.5.0.5 and earlier maintenance levels IBM WebSphere MQ 7.1 - IBM WebSphere MQ 7.1.0.6 and earlier maintenance levels REMEDIATION/FIXES WebSphere MQ 8.0 - Apply fixpack 8.0.0.4 [http://www-01.ibm.com/support/docview.wss?uid=swg21969244] WebSphere MQ 7.5
1480055b24e512932102ab9951e73f8a_4
- Apply interim ifix IT09866 [http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+MQ&release=7.5.0.5&platform=All&function=aparId&apars=IT09866] WebSphere MQ 7.1 - Apply fixpack 7.1.0.7 [http://www-01.ibm.com/support/docview.wss?uid=swg21965293] WORKAROUNDS AND MITIGATIONS None GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this. REFERENCES Complete CVSS v2 Guide [http://www.first.org/cvss/v2/guide] On-line Calculator v2 [http://nvd.nist.gov/CVSS-v2-Calculator] RELATED INFORMATION IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html] IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] ACKNOWLEDGEMENT Reported to IBM by Codenomicon at http://www.codenomicon.com/ [http://www.codenomicon.com/]
1480055b24e512932102ab9951e73f8a_5
CHANGE HISTORY 01 February 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. DISCLAIMER According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. RELATED INFORMATION A Japanese translation is available [http://www.ibm.com/support/docview.wss?uid=swg21977182]
660d6b961d2a2b6f3a28a99b79f1b86d_0
IBM Security Bulletin: Information disclosure in WebSphere Application Server Admin Console (CVE-2017-1741) - United States SECURITY BULLETIN SUMMARY There is a potential information disclosure in the WebSphere Application Server Admin Console. VULNERABILITY DETAILS CVEID: CVE-2017-1741 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1741] DESCRIPTION: IBM WebSphere Application Server could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console panel fields. When exploited an attacker could read files on the file system. CVSS Base Score: 4.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/134931 [https://exchange.xforce.ibmcloud.com/vulnerabilities/134931] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) AFFECTED PRODUCTS AND VERSIONS
660d6b961d2a2b6f3a28a99b79f1b86d_1
This vulnerability affects the following versions and releases of IBM WebSphere Application Server: * Version 9.0 * Version 8.5 * Version 8.0 * Version 7.0 REMEDIATION/FIXES The recommended solution is to apply the interim fix, Fix Pack or PTF containing APARs PI90042 for each named product as soon as practical. For WebSphere Application Server traditional and WebSphere Application Server Hypervisor Edition:
660d6b961d2a2b6f3a28a99b79f1b86d_2
For V9.0.0.0 through 9.0.0.6: · Upgrade to minimal fix pack levels as required by interim fixes and then apply Interim Fix PI90042 [http://www-01.ibm.com/support/docview.wss?uid=swg24044616] [http://www-01.ibm.com/support/docview.wss?uid=swg24044155] [http://www-01.ibm.com/support/docview.wss?uid=swg24043596] [http://www-01.ibm.com/support/docview.wss?uid=swg24042712] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] [http://www-01.ibm.com/support/docview.wss?uid=swg24042513] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] [http://www-01.ibm.com/support/docview.wss?uid=swg24044155] [http://www-01.ibm.com/support/docview.wss?uid=swg24044154] --OR-- · Apply Fix Pack 9.0.0.7 or later.
660d6b961d2a2b6f3a28a99b79f1b86d_3
For V8.5.0.0 through 8.5.5.13: · Upgrade to minimal fix pack levels as required by interim fixes and then apply Interim Fix PI90042 [http://www-01.ibm.com/support/docview.wss?uid=swg24044616] [http://www-01.ibm.com/support/docview.wss?uid=swg24044445] --OR-- · Apply Fix Pack 8.5.5.14 or later (targeted availability 3Q2018).
660d6b961d2a2b6f3a28a99b79f1b86d_4
For V8.0.0.0 through 8.0.0.14: · Upgrade to a minimal fix pack levels as required by interim fix and then apply Interim Fix PI90042 [http://www-01.ibm.com/support/docview.wss?uid=swg24044616] [http://www-01.ibm.com/support/docview.wss?uid=swg24044445] [http://www-01.ibm.com/support/docview.wss?uid=swg24043596] [http://www-01.ibm.com/support/docview.wss?uid=swg24042712] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] [http://www-01.ibm.com/support/docview.wss?uid=swg24042513] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] --OR-- · Apply Fix Pack 8.0.0.15 or later.
660d6b961d2a2b6f3a28a99b79f1b86d_5
For V7.0.0.0 through 7.0.0.43: · Upgrade to a minimal fix pack levels as required by interim fix and then apply Interim Fix PI90042 [http://www-01.ibm.com/support/docview.wss?uid=swg24044616] [http://www-01.ibm.com/support/docview.wss?uid=swg24044445] [http://www-01.ibm.com/support/docview.wss?uid=swg24043596] [http://www-01.ibm.com/support/docview.wss?uid=swg24042712] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] [http://www-01.ibm.com/support/docview.wss?uid=swg24042513] [http://www-01.ibm.com/support/docview.wss?uid=swg24041604] [http://www-01.ibm.com/support/docview.wss?uid=swg24041394] --OR-- · Apply Fix Pack 7.0.0.45 or later. GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
660d6b961d2a2b6f3a28a99b79f1b86d_6
IMPORTANT NOTE IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. REFERENCES Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide] On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0] RELATED INFORMATION IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html] IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] CHANGE HISTORY 06 March 2018: original document published
660d6b961d2a2b6f3a28a99b79f1b86d_7
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. DISCLAIMER According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. RELATED INFORMATION A Japanese translation is available [http://www.ibm.com/support/docview.wss?uid=swg22014402]
4068c295ffdb174016c0a142223d489b_0
IBM Troubleshoot: Logging Problems in IBM WebSphere Application Server - United States TECHNOTE (TROUBLESHOOTING) PROBLEM(ABSTRACT) Trace analysis information for the logging component in the WebSphere® Application Server. SYMPTOM Does not display. RESOLVING THE PROBLEM This document contains troubleshooting information for logging problems in the WebSphere® Application Server. This can help address common issues with this component before calling IBM support and save you time. TAB NAVIGATION * * * Troubleshoot- selected tab, * * Collect data [http://www.ibm.com/support/docview.wss?uid=swg21321060] Overview You will find common questions in this section that may help resolve your logging problems. 1. How do I use JCL with WebSphere® Application Server?
4068c295ffdb174016c0a142223d489b_1
For information on how to use JCL, see The Support Authority: Using Jakarta Commons Logging (JCL) with WebSphere Application Server [https://www.ibm.com/developerworks/websphere/techjournal/0901_supauth/0901_supauth.html] 2. What are IBM recommendations regarding SLF4J and Logback? In general, we recommend that customers use JUL when possible/practical (as mentioned in The Support Authority: A developer's guide to WebSphere Application Server logging [http://www.ibm.com/developerworks/websphere/techjournal/0802_supauth/0802_supauth.html]). JUL provides a good, ubiquitous logging infrastructure, which is suitable for most applications, and integrates with WebSphere Application Server log and trace. Using JUL directly also avoids extra log/trace API "hops" that are introduced by using other log/trace frameworks that map to JUL. The WAS logs are generated using JUL Handlers connected to the root JUL Logger.
4068c295ffdb174016c0a142223d489b_2
In case you don't want to use JUL, or you have code that is already instrumented with another logging package, SLF4J or Logback can be helpful. For example, you may have code already written with Log4J. Log4J log/trace is not routed to WAS log/trace files, and Log4J loggers don't show up in the WAS tree of loggers you can control from the admin console. Further, trace spec settings you make in WAS do not control Log4J logger settings. This is where SLF4J or Logback can come in handy, as you can use them to intercept Log4J calls and forward them to the logging implementation of your choice. In order to integrate well with WAS logs/trace, we would recommend you bind your SLF4J/Logback API to map your log/trace content to JUL -- this will give you the ability to see your logs/trace in the WAS log/trace files, and enable you to have easy admin console control over all of your loggers. 3. How can I get WAS logs to go to syslog or the Windows EventLog?
4068c295ffdb174016c0a142223d489b_3
There are a number of places that users have asked to be able to direct logs to in the past. Most notably, a number of customers have asked for the ability to send logs to syslog. WebSphere Application Server sends all of its logs to java.util.logging (JUL), and customers can customize what happens to the log/trace events by way of using JUL Handlers. Once content is sent to JUL, it can be handled in a variety of flexible ways: 1) By default, we store the content in our log files, such as SystemOut.log, trace.log, or the newer log and trace repositories of the High Performance Extensible Logging framework we added in WebSphere Application Server V8.0. We also send the log content over JMX notifications, which allows for remote access.
4068c295ffdb174016c0a142223d489b_4
2) If customers want to send content to places like SMTP, syslog, event log, or a few other places, they can use SLF4J to route WAS logs to Log4J, and use the corresponding Log4J Appenders. In this configuration, WAS logging routes to java.util.logging, SLF4J's Handler routes the request to Log4J, and Log4J can be configured to write log records to a syslog Appender. 3) If users want to do something even more custom, they can write their own JUL Handlers and plug them into WebSphere Application Server. 4. I am unable to turn on WebSphere Application Server trace. The trace state sets to *=off? The systemOut.log shows: [5/26/15 14:10:44:746 EDT] 000000d9 ManagerAdmin I TRAS0018I: The trace state has changed. The new trace state is *=off. The problem is related to the below two JVM arguments:
4068c295ffdb174016c0a142223d489b_5
-Djava.util.logging.configureByLoggingPropertiesFile=TRUE -Djava.util.logging.config.file=<path>/logging.properties Verify if the above 2 JVM arguments are configured. If yes, temporary disable it so WAS trace can be enabled. 5. The WebSphere Application Server logging has stopped, what may have caused this? The user might have disabled the trace by setting trace output to none. Setting runtime trace output to none impacts the JVM logs. To do that, the runtime trace spec will be set to *=off, which means to turn off all log levels. If customers just want to disable the trace for debug information only, we recommend setting the runtime trace spec, accordingly, instead of setting runtime trace output to none. For example, set to *=info, which is the default.
4068c295ffdb174016c0a142223d489b_6
Verify if the commons-logging.jar and commons-logging.properties exist in the JVM classpath. If yes, suggest to remove it and put them inside the application (with parent_last setting) or put them in the isolated shared library. 6. How can I separate my logs into separate files for each application? In WAS V8.5, we added the application name to log and trace records stored using HPEL (High Performance Extensible Logging). Since HPEL lets you format and filter your log content after it has been persisted to the HPEL log/trace repository, this lets you decide if you want to see your application content on its own (helpful for uncluttered debug of an application), or together with the application server log/trace content (helpful to see impact of server on applications, and vice versa).
4068c295ffdb174016c0a142223d489b_7
For example, if you had 3 applications called app1, app2, and app3, you could create app specific logs as follows: WAS_INSTALL_ROOT\bin> logViewer -includeExtensions appName=app1 > app1.log WAS_INSTALL_ROOT\bin> logViewer -includeExtensions appName=app2 > app2.log WAS_INSTALL_ROOT\bin> logViewer -includeExtensions appName=app3 > app3.log or see everything in one file as follows: WAS_INSTALL_ROOT\bin> logViewer > all.log 7. How can I add my own java.util.logging.Handler to WAS? To create a Handler you need to extend the java.util.logging.Handler class as follows (this example also shows how to filter for only the most severe messages):
4068c295ffdb174016c0a142223d489b_8
import java.util.logging.Handler; import java.util.logging.Level; import java.util.logging.LogRecord; public class MyHandler extends Handler { public void close() { } public void flush() { } public void publish(LogRecord record) { if (record.getLevel().intValue() >= Level.SEVERE.intValue()) { // do something... } } } In your application you can add that Handler to the root logger as follows: import java.util.logging.Handler; import java.util.logging.Logger; ... Handler myHandler = new MyHandler(); Logger logger = Logger.getLogger(""); logger.addHandler(myHandler); ... 8. Why can't I set my own log levels using the Logger setLevel method? The application server can run in two modes.
4068c295ffdb174016c0a142223d489b_9
By default, the logger levels are managed, and we expect any changes to logger levels to be done only through wsadmin or through the admin console. When the trace spec update is applied, we explicitly set each logger to the level specified in the trace spec -- we do not leave any named loggers at level set to null. So, while you can change a logger's level using the setLevel method, that change only lasts until you apply your next trace spec update from wsadmin or the admin console. Basically, changes you make via logger.setLevel are temporary at best, and do not apply automatically to children since the children won't have a null level.
4068c295ffdb174016c0a142223d489b_10
Alternately, you can have the server to be configured by the JRE's logging.properties file by setting the java.util.logging.configureByLoggingPropertiesFile property. In this mode, the application server will not touch the logger levels -- you cannot update the levels through the admin console, nor through wsadmin. See Java virtual machine custom properties [http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-base-dist&topic=xrun_jvm] for more information on this setting. In this mode, you can specify anything you would normally specify in your logging.properties file. Be careful not to use a console handler though, as that will lead to an infinite loop, since we take data sent to System.out, turn it into LogRecords, and send it to the root logger. 9. How can I get java.util.logging to initialize from a jre/bin/logging.properties file in the application server? You can do this via system property: java.util.logging.configureByLoggingPropertiesFile=true
4068c295ffdb174016c0a142223d489b_11
Note that if you do set up your server in this mode, we will not manage your logger levels via the admin console. Note also that we will ignore any console handler entries found in the logging.properties file, since we route System.out to the root logger, which would mean that a console handler would cause an infinite recursion. If you do use this system property, and you want to change logger levels, you have two choices: * * 2) Set the Logger levels programatically using the Logger.setLevel method 10. How can I get the full logger name from log and trace records? The full logger name can be handy to know for enabling trace. How you get to it depends on what log and trace mode you use: Basic log and trace mode: The basic log format (not to be confused with basic log and trace mode), which is the default format for SystemOut.log / SystemErr.log / trace.log has a truncated version of the logger name:
4068c295ffdb174016c0a142223d489b_12
[4/14/11 9:41:45:218 EDT] 00000021 QuickLogTest W hello fine 54857 There is no way to get the full logger name from basic formatted logs. You need to switch to advanced format for your logs/trace if you want to see the full logger name. Once in advanced format, log contents appear as follows: [4/14/11 9:41:45:218 EDT] 00000021 W UOW= source=com.ibm.somelogger.QuickLogTest org= prod= component= thread=[WebContainer : 4] hello fine 54857 HPEL log and trace mode: You can use the HPEL LogViewer command line tool to output the log/trace content in either basic or advanced format. > logviewer -format basic .... [4/14/11 9:41:45:218 EDT] 00000021 QuickLogTest W hello fine 54857 .... > logviewer -format advanced .... [4/14/11 9:41:45:218 EDT] 00000021 W UOW= source=com.ibm.somelogger.QuickLogTest org= prod= component= thread=[WebContainer : 4] hello fine 54857 ... 11. How can I write HPEL content to a database?
4068c295ffdb174016c0a142223d489b_13
If you want to write to a Database, any of the following options will work: 1) Write your own log handler (that writes to a database) and plug it into JSR47. (see the Java doc for java.util.logging.Handler) 2) Write an HPEL reading Java application to read the content from an HPEL log repository and write it to a database 3) Write an HPEL reading Java application to read the content from an HPEL log repository and write it out in .csv format, then just use the common database commands to load the .csv content into the database. 12. How do you tune HPEL for optimal performance in tWAS? In the server.xml, jvmEntries element: - Ensure debugMode is set to false - Ensure RAS JMX notifications are disabled by including -Dcom.ibm.ejs.ras.disablerasnotifications=true in genericJvmArguments - Ensure -Xquickstart is not in the list of genericJvmArguments
4068c295ffdb174016c0a142223d489b_14
<jvmEntries xmi:id="JavaVirtualMachine_1183122130078" verboseModeClass="false" verboseModeGarbageCollection="false" verboseModeJNI="false" runHProf="false" hprofArguments="" debugMode="false" debugArgs="-Dcom.ibm.ws.classloader.j9enabled=true -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=7777" genericJvmArguments="-Dcom.ibm.ejs.ras.disablerasnotifications=true"> In hpelModel.xml: - Ensure textLog is disabled. <hpelTextLog xmi:id="HPELTextLog_1" enabled="false" dataDirectory="${SERVER_LOG_ROOT}"/> 13. How can I tell who is writing to System.err / System.out ? Add the following to your genericJvmArgument s : -Xtrace:print=mt,trigger=method{com/ibm/ejs/ras/System*.*,jstacktrace} 14. How can I identify what code is writing to System.out.println? Add the following to your genericJvmArguments and restart the server to see a stack trace for each call to System.out.println:
4068c295ffdb174016c0a142223d489b_15
-Xtrace:print=mt,trigger=method{java/io/PrintStream.println,jstacktrace} A snippet of the stack trace for a sample application, which calls System.out.println(), with the above JVM argument set, which identifies that the Hello.printHello (Hello.java:15) writes to System.out. 03:41:01.245*0x3277900 mt.0 > java/io/PrintStream.println(Ljava/lang/String;)V Bytecode method, This = 7fffff49f98 03:41:01.247 0x3277900 j9trc_aux.0 - jstacktrace: 03:41:01.248 0x3277900 j9trc_aux.1 - [1] java.io.PrintStream.println (PrintStream.java:829) 03:41:01.248 0x3277900 j9trc_aux.1 - [2] com.ibm.jvm.io.ConsolePrintStream.println (ConsolePrintStream.java:311) 03:41:01.250 0x3277900 j9trc_aux.1 - [3] Hello.printHello (Hello.java:15) 03:41:01.251 0x3277900 j9trc_aux.1 - [4] Hello.main (Hello.java:9)Hello World 03:41:01.253 0x3277900 mt.6 < java/io/PrintStream.println(Ljava/lang/String;)V Bytecode method 15. How can I see who called a particular method? Add the following to your genericJvmArguments:
4068c295ffdb174016c0a142223d489b_16
-Xtrace:print=mt,trigger=method{java/util/logging/Logger.setLevel,jstacktrace} 16. What are the .owner files for in the log directory? The server creates a .owner file for each of the log files. The file content indicates which cell/node/server is the rightful user of the similarly named log file. This is used as a sort of locking mechanism to make sure that users don't improperly configure their systems. If two or more servers are configured to use the same log directory and file name, we can detect it using the .owner file and we will print a warning in the log file. For more information, see Java virtual machine (JVM) log settings [http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-nd-dist&topic=JVMLogs_description] 17. How can I correlate information from thread stacks in the javacore with information in my SystemOut.log file? There are a few ways to correlate content in WAS logs/trace with content in javacore thread dumps:
4068c295ffdb174016c0a142223d489b_17
Best option, if you are using WebSphere Application Server 8.0 / 8.5: Applies to: WAS 8.0.0.4 and above running with Java 626 SR4 and above WAS 8.5.0.2 and above running with Java 7 SR3 and above or Java 626 SR4 and above In recent releases, we have made it possible to have the thread id used in the WebSphere Application Server log/trace match with the thread id used in javacores. In WAS 8.0.0.4 and above, you can use a system property to make the thread id in the logs/trace match the Java thread id. In WAS 8.5.0.2 and above, the thread id used in the logs/trace matches with the Java thread id by default. For more information, see PM60913: Introduce ability to use Java Thread ID in Logs instead of LogRecord Thread ID [http://www-01.ibm.com/support/docview.wss?uid=swg1PM60913] and JVM log interpretation [http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-nd-dist&topic=rtrb_readmsglogs]
4068c295ffdb174016c0a142223d489b_18
Another option if you are using High Performance Extensible Logging (HPEL) / Binary Logging: Applies to: Full profile WAS 8.0.0.0 and above Liberty profile WAS 8.5.5.0 and above Full Profile: Use the HPEL logViewer command to output the logs in advanced format so you can see the full thread name: > logViewer -format advanced (basic is the default format) Liberty Profile: Use the binaryLog command line tool to output the logs in advanced format so you can see the full thread name: > binaryLog view --format=advanced You will get output that looks like the following: [4/14/11 9:41:45:218 EDT] 00000021 W UOW= source=com.ibm.somelogger.QuickLogTest org= prod= component= thread=[WebContainer : 4] The javacore contains the same thread name:
4068c295ffdb174016c0a142223d489b_19
3XMTHREADINFO "WebContainer : 4" J9VMThread:0x1578D700, j9thread_t:0x150D0D04, java/lang/Thread:0x02517CE0, state:R, prio=5 3XMTHREADINFO1 (native thread ID:0x15B0, native priority:0x5, native policy:UNKNOWN) 3XMTHREADINFO3 Java callstack: 4XESTACKTRACE at com/ibm/io/async/AsyncLibrary.aio_getioev2(Native Method) Another option if you are using Advanced format for your SystemOut.log / trace.log: Applies to: All currently supported WebSphere Application Server releases. Change your log/trace format to Advanced. The Advanced format contains the full thread name, as does the javacore. Advanced format Log: [4/14/11 9:41:45:218 EDT] 00000021 W UOW= source=com.ibm.somelogger.QuickLogTest org= prod= component= thread=[WebContainer : 4] The javacore contains the same thread name:
4068c295ffdb174016c0a142223d489b_20
3XMTHREADINFO "WebContainer : 4" J9VMThread:0x1578D700, j9thread_t:0x150D0D04, java/lang/Thread:0x02517CE0, state:R, prio=5 3XMTHREADINFO1 (native thread ID:0x15B0, native priority:0x5, native policy:UNKNOWN) 3XMTHREADINFO3 Java callstack: 4XESTACKTRACE at com/ibm/io/async/AsyncLibrary.aio_getioev2(Native Method) What to do next If the preceding troubleshooting did not help solve your problem, see the Mustgather [http://www-01.ibm.com/support/docview.wss?uid=swg21321060]for logging problems to continue investigation.
5c1c85abd4fe53b88737061c419eb9b6_0
IBM Enabling tracing for the DASH service in Jazz for Service Management - United States DASHL2; DASHL2FAQ; DASHL2MUSTG; enable tracing TECHNOTE (FAQ) QUESTION What is the procedure to enable trace logging to troubleshoot DASH runtime issues/errors? CAUSE You can use trace logging to assist in monitoring system performance and diagnosing problems. Since trace logs can be quite verbose and include many unrelated errors, resetting the logs and then reproducing the problem issue can reduce the time required for log analysis for specific issues. ANSWER Steps to enable tracing: Enable trace logging.
5c1c85abd4fe53b88737061c419eb9b6_1
1. Log into the DASH. After logging in navigate to Console Settings [/support/docview.wss?uid=swg21632844&amp;aid=1] > Websphere Administrative Console. 2. Navigate to Troubleshooting -> Logs & Trace 3. Click on the Server1 -> Select Diagnostic Trace Service. Increase the Maximum Number of Historical Files from 1 to 10. 4. Click Apply, then select Change Log Detail Levels. 5. Click on Runtime tab to enable tracing for the DASH process that is currently running. Enabling tracing from the Runtime tab will keep tracing active until the next time the DASH server process is stopped. To make tracing persistent even after stopping and restarting the DASH server process click the Configuration tab instead. 6. Clear the trace string in the Groups box and replace it with the following: *=info: com.ibm.isc.*=all: com.ibm.isclite.*=all: com.ibm.iscportal.*=all: com.ibm.isclite.service.datastore.consoleproperties.*=INFO
5c1c85abd4fe53b88737061c419eb9b6_2
For the Connection manager (data provider related issues) you will want to enable all for the following components: *=info: com.ibm.isclite.rest.*=all:com.ibm.tivoli.conmgr.*=all 7. Click on the Apply button. 8. If you enabled tracing from the Configuration tab in step 4, then click the "Save" link that appears at the top of the page. ("Save to master configuration")
5c1c85abd4fe53b88737061c419eb9b6_3
Once tracing is enabled, reproduce the DASH runtime issue. Note the time that the issue was reproduced so that the issue can be easily correlated with the trace log entries. Run the log collector program: 1. Change the directory to <JazzSM Home>/ui/bin 2. Run the following command: ./consoleLogCollector.sh or .bat Send us the console_logs.zip file located in <JazzSM Home>/ui directory and attach them to the associated Problem Management Record (PMR). Please include the time the issue was reproduced in the PMR update. Please also provide the DASH version info: <JazzSM Home>/ui/bin/consolecli.sh Version Upload the resulting output file to the PMR
f4cb594276a36020d5c507e830e5969a_0
IBM Security Bulletin: IBM MQ Appliance is affected by a GNU C library (glibc) vulnerability (CVE-2017-8804) - United States SECURITY BULLETIN SUMMARY IBM MQ Appliance has addressed a vulnerability in GNU C library (glibc). VULNERABILITY DETAILS CVEID:CVE-2017-8804 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804] DESCRIPTION:glibc is vulnerable to a denial of service, caused by improper handling of buffer deserialization in the xdr_bytes and xdr_string functions. By sending a specially-crafted UDP packet, a remote attacker could exploit this vulnerability to cause virtual memory allocation, or memory consumption on the system. CVSS Base Score: 7.5 CVSS Temporal Score: Seehttps://exchange.xforce.ibmcloud.com/vulnerabilities/125760 [https://exchange.xforce.ibmcloud.com/vulnerabilities/125760]for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) AFFECTED PRODUCTS AND VERSIONS IBM MQ Appliance 8.0
f4cb594276a36020d5c507e830e5969a_1
Maintenance levels between 8.0.0.0 and 8.0.0.7 IBM MQ Appliance 9.0.x Continuous Delivery (CD) Release Continuous delivery updates between 9.0.1 and 9.0.3 REMEDIATION/FIXES IBM MQ Appliance 8.0 Apply fixpack 8.0.0.8 [https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/IBM+MQ+Appliance+M2000&function=textSearch&text=8.0.0.8] IBM MQ Appliance 9.0.x Continuous Delivery (CD) Release Apply Continuous Delivery Release 9.0.4 [https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/IBM+MQ+Appliance+M2000&function=textSearch&text=9.0.4] WORKAROUNDS AND MITIGATIONS None GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
f4cb594276a36020d5c507e830e5969a_2
REFERENCES Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide] On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0] RELATED INFORMATION IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html] IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] CHANGE HISTORY 04 December 2017 Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
f4cb594276a36020d5c507e830e5969a_3
DISCLAIMER According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
df8a3251e72fb23a935a59c22b4248fe_0
IBM WebSphere Cast Iron Cloud integration fix packs are available - United States NEWS ABSTRACT Fix packs for WebSphere Cast Iron Cloud integration are now available for download. CONTENT Following are links to more information about the latest fix packs available on Fix Central for these versions:
df8a3251e72fb23a935a59c22b4248fe_1
* 7.5.2.0 (App Connect Professional). See this forum Q&A [https://developer.ibm.com/answers/questions/303457/what-is-ibm-app-connect-professional/] for more information. And see App Connect Professional builds and iFix details. [http://www.ibm.com/support/docview.wss?uid=swg21998280] * 7.5.0.1 [http://www.ibm.com/support/docview.wss?uid=swg21972013] * 7.5.0.0 [http://www.ibm.com/support/docview.wss?uid=swg21963355] * 7.0.0.2 [http://www.ibm.com/support/docview.wss?uid=swg21686987] * 7.0.0.1 [http://www.ibm.com/support/docview.wss?uid=swg21678176] * 7.0.0.0 [http://www.ibm.com/support/docview.wss?uid=swg21656428] * 6.4.0.1 [http://www.ibm.com/support/docview.wss?uid=swg21647655] * 6.4.0.0 [http://www.ibm.com/support/docview.wss?uid=swg21641628] * 6.3.0.2 [http://www.ibm.com/support/docview.wss?uid=swg21650993] * 6.3.0.1 [http://www.ibm.com/support/docview.wss?uid=swg21625115] * 6.3.0.0 [http://www.ibm.com/support/docview.wss?uid=swg21619941]
dc8742c03e06c8ea71ada4dffb339ce8_0
IBM Can we remove world-writable permissions - global write permission - United States World writeable TECHNOTE (FAQ) QUESTION Setup a recurring process to remove world-writable from the files and directories: chmod o-w. We are not planning to delete any files. Would this impact functionality ? ANSWER The question is whether or not it is safe to remove world-writable for these files and directories. Some of them are dynamic and will be re-created with world-writable after reboot. For these we would like to remove world-writable on a recurring basis.
dc8742c03e06c8ea71ada4dffb339ce8_1
/export/opt/IBM/tivoli/tip/derby/TTSS Directory-Only /export/opt/IBM/tivoli/tip/derby/TTSS/log Directory-Only /export/opt/IBM/tivoli/tip/derby/TTSS/seg0 Directory-Only /opt/tivoli/cit/bin/etc Directory-Only /opt/tivoli/cit/bin/etc/wscanhw Directory-Only /opt/tivoli/cit/cache_data Directory-Only /tmp/javasharedresources Directory-Only /usr/ibm/common/acsi/logs Directory-Only /usr/ibm/tivoli/common/CIT/logs Directory-Only /var/.com.zerog.registry.xml File /var/ibm/common/acsi/resourceBundleLocation Directory-Only /usr/ibm/common/acsi/repos/persistSVCRepos Directory-Only /usr/ibm/common/acsi/repos/persistSVCRepos/* File /usr/ibm/tivoli Directory-Only /usr/ibm/tivoli/common Directory-Only /usr/ibm/tivoli/common/CIT Directory-Only Answer:
dc8742c03e06c8ea71ada4dffb339ce8_2
DB2 is OK confirmed by DB2 support # Revoke world-writable from recurring DB2 log files /bin/chmod o-w /export/opt/IBM/home/tklmdb2/sqllib/db2dump/stmmlog/stmm.*.log /bin/chmod o-w /opt/IBM/home/tklmdb2/tklmdb2/NODE0000/TKLMDB/.SQLCRT.FLG /bin/chmod o-w /opt/IBM/home/tklmdb2/tklmdb2/NODE0000/TKLMDB/*/.SQLCRT.FLG Tested removing world-writable permissions on DB2 and it is OK. None of these files are TKLM specific. Some of these directories do not belong to TIP. CIT Files TKLM V2 doesn't have them: /opt/tivoli/cit/bin/etc Directory-Only /opt/tivoli/cit/bin/etc/wscanhw Directory-Only /opt/tivoli/cit/cache_data Directory-Only /usr/ibm/tivoli Directory-Only /usr/ibm/tivoli/common Directory-Only /usr/ibm/tivoli/common/CIT Directory-Only /usr/ibm/tivoli/common/CIT/logs Directory-Only Changed the permissions on those files. Everything looked OK: create a master keystore. create an LTO device. create a key, backup and restore, and apply a fixpack.
dc8742c03e06c8ea71ada4dffb339ce8_3
Non-DE /tmp/javasharedresources Directory-Only /var/.com.zerog.registry.xml File Can be deleted DE related files /usr/ibm/common/acsi/logs Directory-Only /var/ibm/common/acsi/resourceBundleLocation Directory-Only /usr/ibm/common/acsi/repos/persistSVCRepos Directory-Only /usr/ibm/common/acsi/repos/persistSVCRepos/* File ** Remove world writable permissions from DE directories. This will not impact functionality. It is OK to change the global write permission on above directories and files.
a3e27fbffa3e58d538a18ec5acfdeef7_0
IBM MTTrapd [SNMP] probe drops traps from specific devices - United States nco_p_mttrapd; snmp; snmp traps; traps; dropped; drop; dropping; malformed; TCP TECHNOTE (FAQ) QUESTION MMTrapd probe : Why are SNMP traps dropped from specific devices? CAUSE SNMP packets can be dropped for a number of reasons, including overloading, malformed packets, malformed traps/informs and incorrectly configured/non-compliant MIBS. ANSWER Traps can be dropped during high loading, so ensure that the traps are being dropped from specific devices under normal load. Use snoop, tcpdump or Wireshark to capture the traps that are being dropped on the probe servers port, as defined in the property file. e.g. Port : 162 Load the PCAP file into the Wireshark GUI and review the trap[s] visually. For traps to be processed they must have enterprise-oid and uptime, otherwise they will be dropped during probe processing by the NET-SNMP libraries.
a3e27fbffa3e58d538a18ec5acfdeef7_1
Try setting Protocol to 'ALL' in case the trap is being sent as TCP|UDP. For SNMPv3 trap and inform processing please refer to the available online FAQ's and supplementary documentation [see related information]. SNMPv3 traps require a unique creatruser entry for each device in the mttrapd.conf file, with the user definition including the devices unique engined-id. Whilst SNMPv3 INFORMs can be sent without an engine-id and a single createuser entry in the ConfPath's mttrapd.conf file. If the trap appears to be RFC compliant, and MTTrapd probe is correctly configured, please send the PCAP file of the trap along with the probes debug log and property file to IBM Tivoli Netcool support for further analysis. IMPORTANT: You should ensure that the latest MTTrapd probe and Netcool/OMNIbus fix pack is installed before contacting IBM Tivoli Netcool support, and that the problem persists with the latest product.
a3e27fbffa3e58d538a18ec5acfdeef7_2
RELATED INFORMATION #Capturing TCP data [http://www-01.ibm.com/support/docview.wss?uid=swg21569745] Support's Guide to the SNMP [MTTrapd] probe [http://www-01.ibm.com/support/docview.wss?uid=swg21607690] SNMPv3 trap reception [http://www-01.ibm.com/support/docview.wss?uid=swg21626348]
2b3e3ecbd0ff79e95acb5c7ca2297c4e_0
IBM Setting a big session time-out value in DASH causes session lock-out - United States DASHL2; session; time-out; timeout; cannot login; locked out ; 2147483647; security.xml TECHNOTE (TROUBLESHOOTING) PROBLEM(ABSTRACT) Using a big value (2147483647) for the session timeout setting in DASH, to achieve the maximum time between timeouts, is causing users to be locked out completely. SYMPTOM After entering the user ID and password in the login page, and then pressing the "continue" button, the login page does not change, stuck at "processing" and then returns to the login page again." All users get essentially locked out completely from DASH sessions. CAUSE In order to maximize the time between session timeouts, the customer is setting the timeout parameter in the security.xml file to 2147483647.
2b3e3ecbd0ff79e95acb5c7ca2297c4e_1
This timeout parameter used in the security.xml file is a WAS setting, but DASH is using a javascript call (settimeout), which causes a condition that prevents a login, if the timeout value is really big. Note: 2147483647 is the maximum positive value for a 32-bit signed binary integer in computing. RESOLVING THE PROBLEM This condition that prevents logins can be averted by setting the custom property LTPAFIX in the consoleProperties.xml to "false". Please follow this steps: 1. On DASH server, navigate to <JazzSM Home>/profile/config/cells/JazzSMNode01Cell/applications/isc.ear/deployments/isc/isclite.war/WEB-INF 2. Take a backup of consoleProperties.xml 3. Open consoleProperties.xml in edit-mode. 4. Search for "LTPAFIX" and change the value from "true" to "false". Example: Before ===== <consoleproperties:console-property id="LTPAFIX" value="true"/> </consoleproperties:ibm-portal-consoleproperties>
2b3e3ecbd0ff79e95acb5c7ca2297c4e_2
After ==== <consoleproperties:console-property id="LTPAFIX" value="false"/> </consoleproperties:ibm-portal-consoleproperties> 5. Save the file. 6. Restart DASH server.
5d71528bfab7b7aeeb0443a316bc83c2_0
IBM Security Bulletin: Vulnerabilities in SSL affect IBM DataPower Gateways (CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, and CVE-2015-0293) - United States datapower; CVE-2015-0287; CVE-2015-0289; CVE-2015-0292; CVE-2015-0293 SECURITY BULLETIN SUMMARY OpenSSL vulnerabilities were disclosed on March 19, 2015 by the OpenSSL Project. IBM DataPower Gateway has addressed the corresponding applicable CVEs.
5d71528bfab7b7aeeb0443a316bc83c2_1
VULNERABILITY DETAILS CVEID: CVE-2015-0287 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287] DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error related to the reuse of a structure in ASN.1 parsing. An attacker could exploit this vulnerability using an invalid write to corrupt memory and execute arbitrary code on the system. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101668 [https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101668] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
5d71528bfab7b7aeeb0443a316bc83c2_2
CVEID: CVE-2015-0289 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289] DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the failure to properly handle missing outer ContentInfo by the PKCS#7 parsing code. An attacker could exploit this vulnerability using a malformed ASN.1-encoded PKCS#7 blob to trigger a NULL pointer dereference. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101669 [https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101669] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
5d71528bfab7b7aeeb0443a316bc83c2_3
CVEID: CVE-2015-0292 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292] DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error when processing base64 encoded data. An attacker could exploit this vulnerability using specially-crafted base 64 data to corrupt memory and execute arbitrary code on the system and cause a denial of service. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670 [https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
5d71528bfab7b7aeeb0443a316bc83c2_4
CVEID: CVE-2015-0293 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293] DESCRIPTION: OpenSSL is vulnerable to a denial of service. By sending a specially-crafted SSLv2 CLIENT-MASTER-KEY message, a remote attacker could exploit this vulnerability to trigger an assertion. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101671 [https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101671] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
5d71528bfab7b7aeeb0443a316bc83c2_5
Note that the following vulnerabilities disclosed on the same day do not impact DataPower appliances: CVEID: CVE-2015-0291 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0291] CVEID: CVE-2015-0207 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0207] CVEID: CVE-2015-0208 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0208] CVEID: CVE-2015-0209 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209] CVEID: CVE-2015-0285 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0285] CVEID: CVE-2015-0286 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286] CVEID: CVE-2015-0288 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288] CVEID: CVE-2015-0290 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0290] CVEID: CVE-2015-1787 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1787] AFFECTED PRODUCTS AND VERSIONS IBM DataPower Gateway appliances all versions through 6.0.0.13, 6.0.1.9, 7.0.0.6, and 7.1.0.4
5d71528bfab7b7aeeb0443a316bc83c2_6
REMEDIATION/FIXES Fix is available in versions 6.0.0.14, 6.0.1.10, 7.0.0.7. Refer to APAR IT07854 [http://www-01.ibm.com/support/docview.wss?uid=swg1IT07854] for [http://www-01.ibm.com/support/docview.wss?uid=swg1IT03868] URLs to download the fix. This bulletin will be updated when a fix is made available for DataPower 7.1.x version. For customers on DataPower 5.x versions, IBM recommends upgrading to a fixed, supported version of the product WORKAROUNDS AND MITIGATIONS None GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this. REFERENCES Complete CVSS v2 Guide [http://www.first.org/cvss/v2/guide] On-line Calculator v2 [http://nvd.nist.gov/CVSS-v2-Calculator] OpenSSL Project vulnerability website [http://www.openssl.org/news/vulnerabilities.html] OpenSSL Advisory on above listed CVEs [https://www.openssl.org/news/secadv_20150319.txt]
5d71528bfab7b7aeeb0443a316bc83c2_7
RELATED INFORMATION IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html] IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/PSIRT] ACKNOWLEDGEMENT None CHANGE HISTORY 15 May 2015: Updated status on 7.1.x 30 April 2015: Original Version Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
5d71528bfab7b7aeeb0443a316bc83c2_8
DISCLAIMER According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
de6e6f344ef5e6634e2d2893074ce6d0_0
IBM Installing Rational Asset Analyzer Plug-in on Rational Developer for z/OS results in error CRIMA1071E - United States RAA; RAAi; Rdz; CRIMA1071E; 41580 TECHNOTE (TROUBLESHOOTING) PROBLEM(ABSTRACT) Attempts to install IBM Rational Asset Analyzer (RAA) Plug-in (RAAi) for IBM Rational Developer for System z (RDz) results in the error CRIMA1071E. SYMPTOM You may receive a message similar to the following when installing RAAi in a RDz V9.0 environment: IBM Rational® Asset Analyzer Plug-in for IBM Rational Developer for System z® 6.1.0.0 cannot be installed into any package group. CRIMA1071E: The installation package 'IBM Rational® Asset Analyzer Plug-in for IBM Rational Developer for System z®' requires components supplied by other packages. The required components might be supplied by the following installation packages: Package: Rational® Developer for System z 7.6 CAUSE The RAAi installation program does not yet support RDz 9.0.
de6e6f344ef5e6634e2d2893074ce6d0_1
RESOLVING THE PROBLEM Install RAAi 6.1 into RDz 9.0 by manually copying the plug-in jar files to the Eclipsedropinsfolder. Follow the steps below to install RAAi: 1. Find the jar files by opening the RAAiInstallRepository.zip file and looking in thepluginsfolder for these two files: * com.ibm.dmh.raai_*.jar * com.ibm.raa.integrate.doc_*.jar 2. Find thedropinssubdirectory. 1. Right click on the properties to find the shortcut used to start RDz. 2. Look at theTargetproperty to see where eclipse.exe resides For example: C:\Program Files\IBM\SDP 3. Create a dropinssubdirectory if one does not exist. 4. Copy the two jar files above to thedropinssubdirectory. 5. Restart RDz (Run as administrator) 6. Verify you have an Asset Analyzerentry in the left pane after RDz restarts by clicking on Window > Preferencesfrom the menu.
de6e6f344ef5e6634e2d2893074ce6d0_2
If you later wish to delete this copy of RAAi 6.1, simply remove the two plug-in jar files that you previously copied into the dropins subdirectory. Cross reference information Segment Product Component Platform Version Edition Software Development Rational Asset Analyzer for System z
da09568e7cf9ebd5b7610654c4bff1f1_0
IBM Security Bulletin: WebSphere Message Broker and IBM Integration Bus are affected by denial of service vulnerability (CVE-2014-8901) - United States WMB IIB SECURITY BULLETIN SUMMARY WebSphere Message Broker and IBM Integration Bus are affected by denial of service vulnerability. Pattern matching while validating a specially crafted XML document causes XML4C to consume 100% CPU
da09568e7cf9ebd5b7610654c4bff1f1_1
VULNERABILITY DETAILS CVEID: CVE-2014-8901 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8901] DESCRIPTION: IBM XML4J and XML4C libraries contain a denial of service vulnerability when loading specially crafted content. This causes the CPU to consume 100% of available resources and creates serious performance degradation to the system. CVSS Base Score: 4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99110 [https://exchange.xforce.ibmcloud.com/vulnerabilities/99110] for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P) AFFECTED PRODUCTS AND VERSIONS WebSphere Message Broker V8 IBM Integration Bus V9 and V10 REMEDIATION/FIXES
da09568e7cf9ebd5b7610654c4bff1f1_2
Product VRMF APAR Remediation/Fix IBM Integration Bus V10 IT07064 An interim fix is available from IBM Fix Central for all platforms. http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/Integration+Bus&release=All&platform=All&function=aparId&apars=IT07064 [http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/Integration+Bus&release=All&platform=All&function=aparId&apars=IT07064] The APAR is targeted to be available in fix pack 10.0.0.4 IBM Integration Bus V9 IT07064 An interim fix is available from IBM Fix Central for all platforms. http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/Integration+Bus&release=All&platform=All&function=aparId&apars=IT07064 [http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/Integration+Bus&release=All&platform=All&function=aparId&apars=IT07064]
da09568e7cf9ebd5b7610654c4bff1f1_3
The APAR is targeted to be available in fix pack 9.0.0.6 WebSphere Message Broker V8 IT07064 An interim fix is available from IBM Fix Central for all platforms. http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Message+Broker&release=All&platform=All&function=aparId&apars=IT07064 [http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Message+Broker&release=All&platform=All&function=aparId&apars=IT07064] The APAR is targeted to be available in fix pack 8.0.0.7 To mitigate the vulnerability, after an interim fix or fixpack containing IT07064 is applied you must set the following environment variable to disable the use of regular expressions by the MRM parser before starting the broker or integration node: * MQSI_DISABLE_REGEX_IN_XML4C=yes For unsupported versions of the product IBM recommends upgrading to a fixed, supported version/release/platform of the product.
da09568e7cf9ebd5b7610654c4bff1f1_4
The planned maintenance release dates for WebSphere Message Broker and IBM Integration Bus are available at : http://www.ibm.com/support/docview.wss?uid=swg27006308 [http://www.ibm.com/support/docview.wss?uid=swg27006308] WORKAROUNDS AND MITIGATIONS None known GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
da09568e7cf9ebd5b7610654c4bff1f1_5
IMPORTANT NOTE IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. REFERENCES Complete CVSS v2 Guide [http://www.first.org/cvss/v2/guide] On-line Calculator v2 [http://nvd.nist.gov/CVSS-v2-Calculator] RELATED INFORMATION IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html] IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] ACKNOWLEDGEMENT None CHANGE HISTORY 29-February-2016 - Original version Published
da09568e7cf9ebd5b7610654c4bff1f1_6
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. DISCLAIMER According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. RELATED INFORMATION A Japanese translation is available [http://www.ibm.com/support/docview.wss?uid=swg21978064]
da09568e7cf9ebd5b7610654c4bff1f1_7
Cross reference information Segment Product Component Platform Version Edition Business Integration WebSphere Message Broker 8.0 PRODUCT ALIAS/SYNONYM WMB IIB
20a2143661e360b3faa5b11b339f509a_0
IBM Recommended values for web server plug-in config - United States TECHNOTE (FAQ) QUESTION In the web server plug-in, what do the LoadBalanceWeight, MaxConnections, ConnectTimeout, ServerIOTimeout, RetryInterval, IgnoreAffinityRequests, and GetDWLMTable options mean and what are the recommended settings for these options? What affect does Session Affinity have? How are connections handled during plug-in fail-over? What is the effect of using more than one web server child process? ANSWER To understand how load balancing works in the web server plug-in, see Understanding IBM HTTP Server plug-in Load Balancing in a clustered environment [http://www.ibm.com/support/docview.wss?uid=swg21219567]. To understand how fail-over works in the web server plug-in, see Understanding HTTP plug-in failover in a clustered environment [http://www.ibm.com/support/docview.wss?uid=swg21219808].
20a2143661e360b3faa5b11b339f509a_1
LoadBalanceWeight is a starting "weight". The value is dynamically changed by the plug-in during runtime. The "weight" of a server (or clone) is lowered each time a request is assigned to that clone. When all weights for all servers drop to 0 or below, the plug-in has to readjust all of the weights so that they are above 0. Using a starting value of only 2 (default), means that the weights will get to 0 very quickly and the plug-in will constantly be readjusting the weights. Therefore, It is recommended to start with a higher LoadBalanceWeight. The IBM WebSphere Application Server administrative console will allow a value up to 20 for this. However, it is certainly possible to manually edit the plugin-cfg.xml file and specify some other value for LoadBalanceWeight that is higher than 20.
20a2143661e360b3faa5b11b339f509a_2
Note: At runtime, the LoadBalanceWeight of each appserver in a cluster are normalized by their highest common factor. For example, 100, 90, 80 have a common factor of 10. So, these configured weights would be divided by 10 at runtime, resulting in actual starting weights of only 10, 9, 8. Setting all clones to the same starting LoadBalanceWeight (for example: 20, 20, 20) will result in an actual starting weight of only 1 for each, because of normalization. So, it is recommended to set the weight of at least one of the clones to be off by a value of 1. For example, if there are 3 clones, you might choose the starting LoadBalanceWeights to be: 20, 20, 19. After normalization the weights will be unchanged. Recommended values = all clones the same, except one clone off by one (for example: 20, 20, 19)
20a2143661e360b3faa5b11b339f509a_3
MaxConnections is used to gauge when a server is "starting to become overwhelmed". It is not used to determine when to fail-over (mark the server "down"). When a request is sent from the plug-in to the WAS appserver, it is called a "PendingRequest", until the response comes back. If the application running in WebSphere Application Server is handling requests quickly, each request will only be PENDING for a very short time. So, under ideal conditions, MaxConnections is not needed and therefore the default is (-1) meaning unlimited. However, sometimes an application may start to become overwhelmed and the application may not be able to handle the requests as quickly. Consequently Pending Requests start to build up. MaxConnections can be used to put a limit on the number of PENDING requests per server. When the MaxConnections limit is reached, the plug-in will stop sending requests to that appserver, but it is not marked down. The optimal value for MaxConnections will depend on how
20a2143661e360b3faa5b11b339f509a_4
quickly the application and appserver respond to each request. If normal responses are returned in less than one second, it may be appropriate to set a low value for MaxConnections, like 20 or so. However, if it normally takes several seconds to get a response from the application, then it would be prudent to use a higher value for MaxConnections, like 100. Please note that if the MaxConnections limit has been reached the plug-in will not send ANY more requests to that server until responses come back for the current PENDING requests, and the pendingRequests count drops back down below the MaxConnections limit.
20a2143661e360b3faa5b11b339f509a_5
Recommended value = 20 - 100 depending on application response times
20a2143661e360b3faa5b11b339f509a_6
*Best Practices: with MaxConnections="-1" use LogLevel="Stats" to monitor the pendingRequests numbers in the plug-in log, under normal conditions. Then, choose a value for MaxConnections that is significantly higher than the highest number shown in the log. This method will help you to determine a MaxConnections value that is right for your specific environment. ConnectTimeout means "how long should the plug-in wait when trying to open a socket to the Application Server"? If there are streams already open and available to the Application Server, the plug-in will use one of those. However, sometimes the plug-in needs to open a new stream to the Application Server. That should not take very long, so the value for ConnectTimeout should be very small. A ConnectTimeout value of 0 means never time-out. In that case, the time-out is left up to the OS TCP layer, which is NOT ideal. It is much better to specify a small positive number (like 5 seconds). Recommended value = 5
20a2143661e360b3faa5b11b339f509a_7
ServerIOTimeout means "how long should the plug-in wait for a response from the application". After the socket is opened, the plug-in sends the request to the Application Server. The application processes the request and a response is sent back to the client, through the plug-in. How long should that take? What is reasonable, based on the application? There is no single correct answer here. It depends on the application. If the application is very quick to respond, then you can use a lower value for ServerIOTimeout. However, if the application requires more time to process the request (maybe to retrieve data from a database), then you should use a higher number for ServerIOTimeout. Using a value of 0 means that the plug-in will NOT time-out the request. This is often NOT ideal. A positive value means that the plug-in will NOT mark the appserver down after a ServerIOTimeout pops. So, if you want the plug-in to continue sending requests to the timed-out appserver, use a positive value.
20a2143661e360b3faa5b11b339f509a_8
On the other hand, a negative value means that the plug-in WILL mark the appserver down after a ServerIOTimeout pops. So, if you want the plug-in to immediately mark the appserver down and fail-over to another appserver in the same cluster, use a negative value.
20a2143661e360b3faa5b11b339f509a_9
Recommended value = -900 (that is negative 900)
20a2143661e360b3faa5b11b339f509a_10
Note: The ability to use a negative ServerIOTimeout value was introduced in plug-in apar PK72097 [http://www-01.ibm.com/support/docview.wss?uid=swg1PK72097]. *Best Practices: use traces to determine the amount of time it takes for your application to respond to requests under normal conditions. Be sure to include the longest running requests that take the most time to respond. Then choose a value for ServerIOTimeout that is much larger (2X or 3X or more) than the longest response time. This method will ensure that your ServerIOTimeout is high enough to allow adequate time for the application to respond normally. Make it a negative value so that if the ServerIOTimeout pops, the plug-in will immediately mark the server down, and retry the request to a different appserver.
20a2143661e360b3faa5b11b339f509a_11
ServerIOTimeoutRetry can be used to decrease the number of retries after ServerIOTimeout has fired. By default, the Plug-in will try a request equal to the number of members in the cluster. For example, if the cluster has four members, and there is a ServerIOTimeout, the Plug-in will try it a second time. If the retry fails with ServerIOTimeout fired, then it will try a third time, and a fourth time if needed. But after four attempts, the Plug-in will give up and stop retrying. If you want to override this default behavior and reduce the number of retries after ServerIOTimeout, you can set ServerIOTimeoutRetry to a value that is less than the number of members in the cluster. Recommended value = -1 (this is the default) Note: This property was introduced by Plug-in apar PM70559 [http://www-01.ibm.com/support/docview.wss?uid=swg1PM70559].
20a2143661e360b3faa5b11b339f509a_12
RetryInterval is the time that the plug-in will wait before trying again to use an appserver that was marked down. The optimal value for RetryInterval depends on the number of appservers in the cluster, and the value used for ServerIOTimeout. You can use the following formula to determine the maximum RetryInterval value for your plug-in config: (number of appservers in cluster - 1) x (absolute ServerIOTimeout) - 1 For example, if there are two appservers in the cluster, and the value of ServerIOTimeout is -900, then the maximum RetryInterval setting would be: (2 - 1) x (900) - 1 = 899 seconds or less Another example, if there are four appservers in the cluster, and the value of ServerIOTimeout is -900, then the maximum RetryInterval setting would be: (4 - 1) x (900) -1 = 2699 seconds or less
20a2143661e360b3faa5b11b339f509a_13
Warning: Setting RetryInterval to a value higher than the recommended maximum, based on the formula above, can lead to an undesirable situation where all of the appservers in the cluster may be marked down simultaneously resulting in all requests temporarily failing. Recommended value = 60 (this is the default) Affinity requests are requests that contain a session cookie (ie. JSESSIONID). The session cookie is set by the Session Manager in WAS to ensure that all subsequent requests from the same client return to the same app server in the cluster. The session cookie contains the clone ID (or partition ID) of that specific app server. The web server Plug-in will look for the session cookie and use the clone ID to send the request to that specific WAS app server. An affinity request is not load balanced.
20a2143661e360b3faa5b11b339f509a_14
In the plug-in config there is a property called IgnoreAffinityRequests. This property determines if affinity requests will affect the load balance weights, or not. The default value for IgnoreAffinityRequests is True, which means that affinity requests will not have any affect on the load balance weights. This is best for environments where there are no, or few, affinity requests. On the other hand, for an environment with a lot of affinity requests, it may be better to set IgnoreAffinityRequests to False so that the load balance weights will accurately reflect the effect of having a lot of affinity requests.
20a2143661e360b3faa5b11b339f509a_15
Fail-over occurs when the plug-in marks a cluster member appserver (or clone) as "down", and then sends the pending requests to other members of the same cluster. This can happen if the plug-in is unable to open a new connection to the appserver within the ConnectTimeout. Or fail-over can happen if the plug-in has already sent the request to the appserver, but does not receive a response from the application within ServerIOTimeout. When the plug-in marks a cluster member appserver "down", it will handle the PENDING requests in one of two ways: Prior to plug-in apar PM12112 [http://www-01.ibm.com/support/docview.wss?uid=swg1PM12112], the plug-in would send all of the pending requests to the very next appserver in the cluster. However, after plug-in apar PM12112 [http://www-01.ibm.com/support/docview.wss?uid=swg1PM12112], the plug-in will randomly send the pending requests to any of the available appservers in the cluster. While the appserver is marked "down" the plug-in will no longer
20a2143661e360b3faa5b11b339f509a_16
send any requests to it. After RetryInterval the plug-in will check to see if that appserver can be used successfully again. If so, the "down" flag will be removed and the appserver will be used again.
20a2143661e360b3faa5b11b339f509a_17
Note: By default, the number of attempts to handle a request is limited by the number of appservers in the cluster. For example, if there are only two appservers in the cluster, and the request fails once, the plug-in will only attempt that request one more time (total of two attempts). Or another example, if there are five appservers in the same cluster, and the request fails once, then the plug-in will attempt to retry that same request up to four more times (total of five attempts). That number includes retries sent to the same appserver (session affinity), or attempts sent to different appservers (fail-over). Update: The plug-in apar PM70559 [http://www-01.ibm.com/support/docview.wss?uid=swg1PM70559] introduced a new setting called "ServerIOTimeoutRetry" that can be used to control the number of retries due to ServerIOTimeout.
20a2143661e360b3faa5b11b339f509a_18
If Memory-to-Memory (M2M) session replication is enabled in WebSphere Application Server, then the GetDWLMTable setting in the plug-in config must be changed to "true". Memory-to-Memory replication uses partition IDs rather than clone IDs. This can lead to broken session affinity if GetDWLMTable is set to false (which is the default). So it is very important to set GetDWLMTable="true" whenever using M2M in WebSphere Application Server. Recommendation = GetDWLMTable="true" whenever M2M is used in WebSphere Application Server.
20a2143661e360b3faa5b11b339f509a_19
Each web server child process loads a separate instance of the web server plug-in. And multiple running instances of the web server plug-in do not share information with each other. For example if the IBM HTTP Server web server is configured to start 3 child processes (StartServers 3), then there will be 3 instances of the web server plug-in running (one for each IBM HTTP Server child process). The dynamically changing LoadBalanceWeight of each cluster member is not shared between the plug-in instances. So, in one instance of the plug-in "member1" might be considered UP with a weight of 5, when in another instance of the plug-in "member1" might be considered DOWN and unusable. This can result in possibly different behaviors depending on which child process / plug-in instance handles each incoming request. For this reason it is recommended that you should configure the web server to use only a few web server child processes with many threads on each. See Tuning IBM HTTP Server to
20a2143661e360b3faa5b11b339f509a_20
maximize the number of client connections to WebSphere Application Server [http://www.ibm.com/support/docview.wss?uid=swg21167658].
20a2143661e360b3faa5b11b339f509a_21
If you choose to use more than one web server child process, keep in mind that the plug-in settings are handled on a per instance basis. For example, MaxConnections means the number of pending requests that will be allowed on that server, for each plug-in instance. If MaxConnections = 20, and there are 3 web server child processes (3 plug-in instances), then each instance will allow 20 pending connections to that Application Server for a total of 60 pending connections.
20a2143661e360b3faa5b11b339f509a_22
Related information [http://g01zciwas003.ahe.pok.ibm.com/support/dcf/preview.wss?host=g01zcidbs003.ahe.pok.ibm.com&db=support/swg/swgtech.nsf&unid=E3B7487DDFB64D2C852574C00071DA95&taxOC=SSCC2GP&MD=2011/05/11%2011:05:12&sid=#]Understanding plug-in Load Balancing [http://www.ibm.com/support/docview.wss?uid=swg21219567] Understanding plug-in Fail-over [http://www.ibm.com/support/docview.wss?uid=swg21219808] Tuning IBM HTTP Server processes and threads [http://www.ibm.com/support/docview.wss?uid=swg21167658] web server plug-in configuration [http://www.ibm.com/support/docview.wss?uid=swg21450051] Modifying plug-in properties from the WebSphere Application Server administrative console [http://www.ibm.com/support/docview.wss?uid=swg21460889] How do the properties ServerIOTimeout and PostBufferSize affect plug-in behavior? [http://www-01.ibm.com/support/docview.wss?uid=swg21408884]
7438a27c06c30920d65c98e44adc947a_0
IBM Performance issue on Mac OS X Launching and Closing SPSS Statistics 21 or 22. - United States Mac OS X; Performance; open; close; exit; launch; 10.6.x 10.7.x 10.8.x 10.9.x TECHNOTE (TROUBLESHOOTING) PROBLEM(ABSTRACT) With SPSS Statistics 21 or 22 software installed on Mac OS X. The software was running normally, but for what ever reason, the program might fail or close improperly by using Force Quit several times. CAUSE This has been identified as a product defect under APAR PM90266 ENVIRONMENT This technote applies with any Mac OS X compatible with Statistics 21 or 22, Not version 23. - IBM SPSS Statistics 21 release is supported on Apple Macintosh 10.6 (Snow Leopard), 10.7 (Lion), and 10.8 (Mountain Lion) with Intel processor.